Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
filtering theory
biblio
Performance Analysis on Denial of Service attack using UNSW-NB15 Dataset
Submitted by aekwall on Fri, 04/01/2022 - 2:07pm
Intrusion Detection
feature extraction
pubcrawl
Resiliency
cyberattack
Compositionality
Performance analysis
malware
network security
Predictive Metrics
information management
scientific computing
DoS
filtering theory
UNSW-NB15
Scientific Computing Security
biblio
Command Filter-Based Adaptive Finite-Time Prescribed Performance Control for Uncertain Nonlinear Systems with Fuzzy Dead-Zone Input
Submitted by grigby1 on Mon, 12/20/2021 - 2:39pm
Observers
Trajectory
Stability criteria
simulation
Scalability
Resiliency
resilience
pubcrawl
prescribed performance
adaptive filtering
Metrics
fuzzy dead-zone input
filtering theory
command filter
adaptive systems
Adaptive finite-time control
adaptive filters
biblio
A Novel Approach for Vehicle-logo Location Based on Edge Detection and Morphological Filter
Submitted by grigby1 on Mon, 02/08/2021 - 2:03pm
Metrics
vehicles
vehicle-logo recognition system
vehicle-logo location
Vehicle-logo background
Texture recognition
texture measure
security
Scalability
Resiliency
resilience
pubcrawl
Morphology filter
Morphology
automobiles
mathematical morphology filter
mathematical morphology
Licenses
information security
Image texture analysis
image texture
Image edge detection
Filters
filtering theory
electronic commerce
edge detection
computer security
composability
biblio
Adaptive filtering of non-fluctuation interference when receiving signals with multi-position phase shift keying
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
non-fluctuation interference
weighting coefficients
signal with multi-position phase shift keying
Signal to noise ratio
Scalability
Resiliency
resilience
recursive filters
receiving signals
Receivers
quadrature coherent signal receiver
pubcrawl
Power harmonic filters
Phase shift keying
optimal filter parameters
nonfluctuation interference
adaptation coefficient
noise immunity
multiposition phase shift keying
Metrics
interference (signal)
Interference
harmonic interference
Harmonic analysis
filtering theory
constant envelope
Bit error rate
adjustment algorithm
adaptive nonrecursive filter
adaptive filters
adaptive filtering
adaptive filter
biblio
LBM: A Security Framework for Peripherals within the Linux Kernel
Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
powerful filtering functionality
Linux (e)BPF modules
Linux kernel
Linux-Kernel
malicious peripherals
malicious USB
NFC devices
operating systems (computers)
OS software stacks
Peripheral
peripheral attack surface
Linux
Protocols
pubcrawl
resilience
Resiliency
security
Smartphones
standardized communication protocols
Universal Serial Bus
USB
cyber physical systems
Metrics
Predictive Metrics
Bluetooth
bluetooth security
composability
computer network security
computer peripheral equipment
Computer peripherals
Cyber Physical System
Linux Operating System Security
eBPF
eBPF packet filtering mechanism
external GPU
filtering theory
general security framework
host operating system
Human behavior
Kernel
LBM framework
biblio
A Template Matching Background Filtering Method for Millimeter Wave Human Security Image
Submitted by aekwall on Mon, 08/03/2020 - 10:28am
bilateral filtering
adaptive filtering
traditional filtering method
template matching background filtering method
template matching
objects identification
Object recognition
millimetre wave imaging
millimeter wave security image
millimeter wave human security inspection
millimeter wave human security image
Level Set Segmentation
level set algorithm
image details
human body area
Scalability
background noise
background area
adaptive template
actual millimeter wave image
matched filters
set theory
image matching
image denoising
image segmentation
filtering theory
Metrics
pubcrawl
Resiliency
biblio
Cuckoo-RPL: Cuckoo Filter based RPL for Defending AMI Network from Blackhole Attacks
Submitted by grigby1 on Mon, 06/01/2020 - 3:58pm
Law
Wireless communication
version number attack
smart power grids
smart meters
Smart Grid
Scalability
RPL
Routing protocols
routing protocol for low-power and lossy networks
Routing
Resiliency
resilience
pubcrawl
power system security
advanced metering infrastructure
IETF ROLL working group
filtering theory
Cyber Attacks
cuckoo-RPL
cuckoo filter.
cuckoo filter based RPL
computer network security
computer network reliability
Blackhole attack
authorisation
authentication
AMI network
Advanced Metering Infrastructure (AMI)
biblio
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
Submitted by aekwall on Mon, 03/30/2020 - 11:42am
quantum computers
wireless sensor networks
Wireless Sensor network communication
ubiquitous internetworking
tiny sensor nodes
telecommunication security
stage permeated filtering mechanism
security of data
Scalability
resource-aware security
Resiliency
quantum cryptography
quantum computing security
quantum computing
Pervasive Computing Security
pubcrawl
Predictive Metrics
lightweight quantum-safe security concept
Intrusion Detection Systems
internetworking
Internet of Things
filtering theory
distributed sensor nodes
contemporary cryptographic mechanisms
Computers
composability
Ciphers
Base stations
biblio
A filter selection based physical layer security system
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
filter design
signal processing security
USRP
software radio
RRC
root raised cosine filters
Roll of factor
radio networks
physical layer security system
physical layer security method
physical layer security
Physical layer
filtering theory
filter selection
network security
EVM
eavesdropping attacks
eavesdropper
Signal to noise ratio
Metrics
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
telecommunication security
Receivers
Conferences
biblio
Applying Sigmoid Filter for Detecting the Low-Rate Denial of Service Attacks
Submitted by grigby1 on Mon, 11/19/2018 - 12:24pm
Servers
NS3 simulation
Probabilistic logic
pubcrawl
re-transition timeout mechanism
resilience
Resiliency
Routing protocols
Scalability
NS-3 Simulation
sigmoid filter optimization
TCP congestion control window algorithm
TCP packet size
telecommunication congestion control
telecommunication traffic
threshold bandwidth filter
transport protocols
attacker traffic
network efficiency
MATLAB
low-rate DoS attack detection
low-rate denial of service attack detection
low-rate bandwidth
Human Factors
honey-pot server
honey pots
high rate attacks
filtering theory
distributed DoS
denial of service (dos)
computer network security
Computer crime
Bandwidth
1
2
next ›
last »